Modelling Agents’ Knowledge Inductively
This note introduces my extensions to Paulson’s “Inductive Approach” in order to reason about agents’ knowledge. First, I argue that an agent knows all the components of those messages she creates. I exploit this notion on some crypto-protocols with particular message structure. Then, I allow a new event, message reception, to occur on the network. This leads to a broad definition of agents’ knowledge, which extends the existing definition of spy’s knowledge. I will discuss strengths and weaknesses of the two models when proving session key knowledge.
KeywordsModelling Agent Computer Laboratory Computer Security Inductive Approach Message Reception
Unable to display preview. Download preview PDF.
- 1.Abadi, M., Burrows, M., Kaufman, C., Lampson, B.: Authentication and Delegation with Smart-cards. DIGITAL Technical Report 67, California (1990)Google Scholar
- 2.Bella, G.: Enhancing the Inductive Approach by Message Reception. Technical Report No. 460, Cambridge University, Computer Laboratory (1999)Google Scholar
- 3.Bella, G.: Are Timestamps Worth the Effort? A Formal Treatment. Technical Report No. 427, Cambridge University, Computer Laboratory (1998)Google Scholar
- 5.Lowe, G.: A Hierarchy of Authentication Specifications. In: Proc. of Tenth IEEE Computer Security Foundations Workshop (1997)Google Scholar
- 6.Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6, 85–128 (1998)Google Scholar